首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3411篇
  免费   268篇
  国内免费   3篇
电工技术   47篇
综合类   3篇
化学工业   1054篇
金属工艺   44篇
机械仪表   78篇
建筑科学   128篇
矿业工程   3篇
能源动力   122篇
轻工业   399篇
水利工程   18篇
无线电   320篇
一般工业技术   658篇
冶金工业   107篇
原子能技术   45篇
自动化技术   656篇
  2024年   5篇
  2023年   36篇
  2022年   164篇
  2021年   266篇
  2020年   112篇
  2019年   103篇
  2018年   128篇
  2017年   128篇
  2016年   161篇
  2015年   142篇
  2014年   151篇
  2013年   235篇
  2012年   221篇
  2011年   279篇
  2010年   195篇
  2009年   197篇
  2008年   168篇
  2007年   146篇
  2006年   141篇
  2005年   100篇
  2004年   90篇
  2003年   75篇
  2002年   53篇
  2001年   38篇
  2000年   30篇
  1999年   38篇
  1998年   37篇
  1997年   32篇
  1996年   30篇
  1995年   13篇
  1994年   25篇
  1993年   11篇
  1992年   10篇
  1991年   5篇
  1989年   8篇
  1988年   2篇
  1987年   4篇
  1986年   6篇
  1985年   12篇
  1984年   9篇
  1983年   17篇
  1982年   8篇
  1981年   9篇
  1980年   12篇
  1979年   7篇
  1978年   3篇
  1977年   9篇
  1976年   3篇
  1975年   2篇
  1973年   2篇
排序方式: 共有3682条查询结果,搜索用时 31 毫秒
111.
This work presents a distributed method for control centers to monitor the operating condition of a power network, i.e., to estimate the network state, and to ultimately determine the occurrence of threatening situations. State estimation has been recognized to be a fundamental task for network control centers to operate safely and reliably a power grid. We consider (static) state estimation problems, in which the state vector consists of the voltage magnitude and angle at all network buses. We consider the state to be linearly related to network measurements, which include power flows, current injections, and voltage phasors at some buses. We admit the presence of several cooperating control centers, and we design two distributed methods for them to compute the minimum variance estimate of the state, given the network measurements. The two distributed methods rely on different modes of cooperation among control centers: in the first method an incremental mode of cooperation is used, whereas, in the second method, a diffusive interaction is implemented. Our procedures, which require each control center to know only the measurements and the structure of a subpart of the whole network, are computationally efficient and scalable with respect to the network dimension, provided that the number of control centers also increases with the network cardinality. Additionally, a finite-memory approximation of our diffusive algorithm is proposed, and its accuracy is characterized. Finally, our estimation methods are exploited to develop a distributed algorithm to detect corrupted network measurements.  相似文献   
112.
Nowadays, especially after the recent financial downturn, companies are looking for much more efficient and creative business processes. They need to place better solutions in the market in a less time with less cost. There is a general intuition that communication and collaboration, especially mixed with Web 2.0 approach within companies and ecosystems, can boost the innovation process with positive impacts on business indicators. Open Innovation within an Enterprise 2.0 context is a one of the most chosen paradigm for improving the innovation processes of enterprises, based on the collaborative creation and development of ideas and products. The key feature of this new paradigm is that the knowledge is exploited in a collaborative way flowing not only among internal sources, i.e. R&D departments, but also among external ones as other employees, customers, partners, etc. In this paper we show how an ontology-based analysis of plain text can provide a semantic contextualization of content support tasks, such as finding semantic distance between contents, and can help in creating relations between people with shared knowledge and interests. Along this paper we will present the results obtained by the adoption of this technology in a large corporate environment like Bankinter, a financial institution, Telefonica I+D, an international telecommunication firm and Repsol, a major oil company in Spain.  相似文献   
113.
Nowadays the low cost of wireless communications allows the real time monitoring of the state of manual-pick warehouse systems making possible the real time control of these systems. At this aim, an approach based on a two-level model is presented in this paper. At the lower level, Petri nets are used to build online a model representing the active missions state and to detect conflicts among resources. At the upper level, logical expressions are used to add constraints for a single mission or item. The model is proved to be effective for online monitoring, scheduling and rescheduling of warehouse activities.  相似文献   
114.
A hybrid model for real time simulation of urban traffic   总被引:1,自引:0,他引:1  
In this paper a hybrid model is presented to predict the behavior of traffic in urban area. Intersections and on/off-ramps are modeled by Colored Timed Petri Nets while road links are modeled by a stochastic discrete time model. It is assumed that vehicle routings at each intersection are stochastic. A Particle Filter algorithm based on the hybrid model is developed to estimate the system state. The validation of the model by using real data is discussed. The limited computational effort required makes the model suitable to be used in simulation-based control schemes for urban traffic.  相似文献   
115.
This paper presents a multi-application traffic generator (MTG), aimed at the generation of packets over a LAN. The generated traffic simulates the one produced by a number of both isochronous and anisochronous applications, thus allowing the measurement of a number of parameters relevant to the communication network. From a test point of view, data generated by the MTG system is equivalent to data generated by real applications spread over a LAN. The MTG system is presented, its implementation is described, some figures relevant to the MTG performance are shown, and the statistical analysis which can be performed on the recorded data is briefly introduced. The user manual of the MTG system is referenced in (Celandroni, Ferro, and Potorti 1995).  相似文献   
116.
The paper describes the region between a Maxwellian plasma source and a floating surface by a 1D-3 V fully kinetic, electrostatic particle simulation. The electric field is self-consistently computed from the Poisson equation. The secondary electron emission is modelled by considering an expression for the secondary emission coefficient dependent on the primary electron energy and surface materials and a realistic secondary electron distribution function is introduced at the collector surface. The model is able to simulate the space-charge-limited conditions as well as the positively charged wall cases.  相似文献   
117.
This study assessed psychological and social factors predicting 12-month changes in fruit and vegetable consumption achieved by 271 men and women from a low-income population randomized to brief behavioral and nutrition education counseling. Greater increases in fruit and vegetable intake were achieved in the behavioral than in the nutrition education condition (1.49 vs. 0.87 portions per day, p=.021). Increases were predicted by baseline social support for dietary change but not by baseline psychological measures. However, short-term (8-week) changes in dietary self-efficacy, encouragement, anticipated regret, perceived benefits, and knowledge of recommended intake predicted 12-month changes in fruit and vegetable consumption independently of gender, age, ethnicity, income, and baseline intake. These factors accounted for 51% of the superiority of behavioral counseling over nutrition education. (PsycINFO Database Record (c) 2010 APA, all rights reserved)  相似文献   
118.
Cases of pipeline damage caused by landslides are common in coastal or mountainous regions, where a continuous monitoring/repair activity is planned in order to maintain their serviceability. The analysis of the soil–structure interaction phenomenon can be invoked to improve the planning and design of buried pipelines, to guide monitoring, and to reduce the risk of damage or failure. Two different approaches are considered in this paper: small scale laboratory tests and numerical simulations using the distinct element method (DEM). The experimental setup consists of a box filled with sand and water. Several experiments were performed, in which the diameter and the depth of the tube varied. The numerical simulations are divided in two separate series: in the first, the numerical model is calibrated and its reliability in reproducing the experimental tests is checked; in the second series, the direction of the relative displacement between the tube and the surrounding “numerical soil” varies over the range ±90° with respect to the horizontal. In the latter, both vertical and horizontal components of the drag force are measured and the corresponding interaction diagrams are constructed. The DEM simulations provide useful information about the shape of the failure mechanisms and the force transfer within the soil.  相似文献   
119.
We propose an alternative approach to generate languages by means of P systems: building up an appropriate representation for a string by means of a corresponding membrane structure and then generating the string by visiting the membrane structure according to a well-specified strategy. To this aim, we consider P systems with active membranes, allowing membrane creation or division or duplication and dissolution, where the output of a computation may be obtained either by visiting the tree associated with the membrane structure, or by following the traces of a specific object, called traveller, or sending out the objects. For each of these approaches, we provide characterizations of recursively enumerable languages based on P systems that use different sets of operations for modifying the membrane structure. Francesco Bernardini: He started his Ph.D. at the University of Sheffield in December 2002 after having previously got a master degree in Computer Science from the University of Pisa in Italy. His research is dedicated to the study of theoretical aspects of membrane computing (P systems) and discrete models of biological systems based on P systems. Marian Gheorghe, Ph.D.: His main research interests are in computational models and their applications to software modelling and testing, formal specifications of agent based systems, software engineering. He was investigating computational power of various generative devices (regular, context-free, fully initial; grammar systems; L-systems and variants). He is currently interested in natural computing (membrane calculus) and biological modelling.  相似文献   
120.
A method is presented for checking secure information flow in Java bytecode, assuming a multilevel security policy that assigns security levels to the objects. The method exploits the type‐level abstract interpretation of standard bytecode verification to detect illegal information flows. We define an algorithm transforming the original code into another code in such a way that a typing error detected by the Verifier on the transformed code corresponds to a possible illicit information flow in the original code. We present a prototype tool that implements the method and we show an example of application. Copyright © 2004 John Wiley & Sons, Ltd.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号